You are on page 1of 3

SYNOPSIS

TITLE- Cryptography

What is Cryptography: cryptography is the practice and


hiding information. It is to be noted that encryption is no
longer an exemptible option when conducting ecommerce.
Given the importance it bears on ecommerce, it id one area
that will have its share of security concerns as well.
Encryption on its own cannot guarantee foolproof security so
cryptography is to be needed.

Public-key cryptography:

• Public-key cryptography was invented in 1976 by


Whitfield Diffie and Martin Hellman.

• In this system, each person gets a pair of keys, called


the public key and the private key.

• Each person’s public key is published while the private


key is kept secret.

• Anyone can send a confidential message just using


public information, but it can only be decrypted with a
private key that is in the sole possession of the
intended recipient.

Cryptography can be classified as the study of


techniques and applications that depend on the existence of
difficult problems. A cryptanalyst attempts to compromise
cryptographic mechanisms and cryptology (from the Greek
kryptos logos, meaning “hidden word”) is the discipline of
cryptography and cryptanalysis combined.

The concept of public key cryptography is to solve the key


management problem. In their concept, each person gets a
pair of keys one called public key and other is called private
key. This eliminates the need for the sender and receiver to
share secret information, as all communication involve only
public keys, and no private key is ever transmitted or
shared. This option also secured the communication against
eavesdropping or betrayal.

The only requirement is that public keys must be associated


with their users in a trusted manner. With PKI, anyone can
send a confidential message by using public key, which is in
the possession of the intended recipient. Furthermore,
public-key cryptography meets the need for privacy and
authentication.

Important points:

• Using public key infrastructure (PKI), anyone can send a


confidential message using public information, which
can be decrypted with a private key in the sole
possession of the intended recipient.

• RSA encryption is widely used and is a ‘de-facto’


encryption standard.

• The MD5 algorithm is intended for digital signature


applications, where large file must be compressed
securely before being encrypted.

Submitted To:
Submitted by:

Amit Mishra Manish Tanwar

Astt. Professor IV Year, A2


Computer
Science